...

CNA 432/532 OSI Layers Security

by user

on
Category: Documents
7

views

Report

Comments

Transcript

CNA 432/532 OSI Layers Security
CNA 432/532 OSI Layers Security
Location: ECC 116
Semester: Fall 2012
Professor: Dr. Amos Olagunju
Office Hrs: 3-4 MW,
|Office: ECC256
Other hours by appointment |
Days: Thursday
Times: 5:00-7:50 pm
E-mail: [email protected]
Phone: (320) 308-5696
Course Description
Security models and protocols for each OSI layer. Network and web security implementation,
monitoring, intrusion, recovery and countermeasures.
Prerequisite: CNA 426 or BCIS 353 or consent of instructor.
Course Web Site: http://web.stcloudstate.edu/aoolagunju/amos1/cna432/CNA432.html
Textbook:
David Mackey: Web Security for Network and System Administrators, Course
Technology, Incorporated, 2003, ISBN 0-619-06495-1
Supplementary Materials: Recent ACM and IEEE articles on OSI Layers Security.
Course Objective
To provide skills on technologies, terms, and processes related to Internet security.
Student Learning Outcomes
1.
2.
3.
4.
5.
6.
7.
Assess security education, risk and incident management.
Identify attacks to IT and Office, and treat taxonomy.
Install network devices, addressing and defense in depth.
Evaluate packet sniffers, threats and solutions to TCP/IP and wireless networks.
Manage preventive, detective and corrective security features for a Linux LAN.
Install preventive and detective measures for UNIX and Windows.
Assess legal concerns, defense probing, and exploitation of security vulnerabilities.
Attendance: Attendance to every class is strongly recommended. In case of an absence, it is
the responsibility of any student to make up work and get notes from other students. If the
student must miss a scheduled test, it is imperative that s/he calls or e-mail me as soon as
possible before the test. Acceptable excuses would include medical emergencies.
Grading: Grades will be distributed on a 5% scale (100% to 95% for an A+, 90% to 94% for an
A, 89% to 85% for a B+, 80% to 84% for a B, etc) and will be compiled from:

30% of the grade is based on tests.



30% of the grade is based on completing the end of chapter case project assignments.
20% of the grade is based on completing assignments.
20% of the grade is based on a final term project.
Assistance: Study groups among the students are useful in reinforcing concepts. The best way
to keep from falling behind the teacher is to stay one step ahead! Study the chapter(s) that will
be covered before each class.
Schedule: This is a tentative schedule for this class. If it is necessary to change the schedule,
students will be given as much advance notice as possible. Students are expected to have
already read the assigned chapters before the class and to come to class prepared.
ii
Course Outline
Week
1
Topics
Chapter
Reading
Specific Subtopics
Introduction to
Information
Security
Security Processes
1
Threats to IT Assets
3
Encryption
4
Fundamentals of
Network Security
5
Network Security
Threats
6
Packet Sniffers; Threats and solutions to
TCP/IP and Wireless networks
Intrusion Detection
7
IDS, NIDS, HIDS and Honeypots
Architecture and Methodologies
8
Preventive, Detective and Corrective
Security Measures
Preventive and Detective Features of
UNIX
Preventive and Detective Features of
Windows
Policy Verification; Security Standards
and Audits; Audit Process and Action
2
2
CIA and PPP Triads; Risk Assessment;
Building Security Policies; Security
Resources
Security Education, Advisory and Issue
management; Risk and Incident
Management
Attacks to IT and Office; Treat Taxonomy
3
4
5
6
7
8
9
10
11
12
Mid-Term
Fundamentals of
System Security
UNIX System
Security
Windows System
Security
Standards and
Compliance
Security Testing
13
14
Symmetric and Asymmetric Encryption;
Hashing Algorithms; Cryptanalysis Attack
Network Devices, Addressing and Defense
in Depth
9
10
11
12
Legal Concerns; Defense Probing;
Exploiting Security Vulnerabilities
Hands-on Project
Annualized Loss
Expectancy, ARO and
TCO Computation
Building Red Hat
Linux Security
Resource Center
Using Business
Intelligence Against a
Company
Research and Use
asymmetric algorithms
Install and Configure
iptables to Simulate a
Firewall
Assess Wireless
Network
Vulnerabilities at
SCSU, and for SNMP
Design a Protected
Network
Administer Security for
Servers Running Linux
Install OpenSSH client
and Authentication
Investigate Firewall on
Windows Server 2003
Review TCSEC and
ISO Requirements and
Audit Reports for
Windows
Configure and Use
nessus utility to
uncover vulnerabilities
Final Project
Presentations
NOTE: The above schedules and procedures for this course are subject to change in the event
of extenuating circumstances.
iii
Appendix
The following items as found in NSTISSI 4011, dated 20 June 1994 are specifically covered in
this class. See http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf for details. Although not
explicitly listed as topics or specific subtopics, the following terms and concepts are covered in
depth via design, implementation and evaluation of alternative security protocols and systems.
•
•
•
•
•
•
•
•
Physical security of cables, environmental controls humidity and air condition via HVAC
and filtered power
Software security assurance
Network security controls via access privileges, dial-up versus dedicated lines
Controls of private and public network via network defense
Security of systems by standardized reviews and levels of security trust assurance
Auditing and monitoring of systems for vulnerabilities and accuracy
Use of evaluation standards to assess the quality of secure systems
Development and evaluation of security education, plans, policies, and procedures
SECURITY BASICS (Awareness Level)
Operations Security (OPSEC)
INFOSEC and OPSEC interdependency
SYSTEM OPERATING ENVIRONMENT (Awareness Level)
Agency Specific Security Policies
Guidance: points of contact, roles and responsibilities
NSTISS PLANNING AND MANAGEMENT (Performance Level)
Instructional Content
Discuss practical performance measures employed in designing security measures and programs.
Introduce generic security planning guidelines/documents
Security Planning
NSTISS program budget
NSTISS POLICIES AND PROCEDURES (Performance Level)
Physical Security Measures
Cabling, environmental controls (humidity and air conditioning), filtered power
Personnel Security Practices and Procedures
Contractors, security training and awareness (initial and refresher)
Software Security
Software security mechanisms to protect information (application security features, concept of least,
privilege, malicious logic protection, segregation of duties)
Administrative Security Procedural Controls
Construction, changing, issuing and deleting passwords, destruction of media, documentation, logs and
journals, emergency destruction, external marking of media, media downgrade and declassification,
preparation of security plans, reporting of computer misuse or abuse, repudiation, sanitization of media
transportation of media,
Auditing and Monitoring
Monitoring systems for accuracy and abnormalities, review of software design standards, verification,
validation, testing, and evaluation processes
iv
The following items as found in NSTISSI 4011, dated 20 June 1994 are specifically covered in
this class. See http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf for details.
SECURITY BASICS (Awareness Level)
Topical Content
Operations Security (OPSEC)
INFOSEC and OPSEC interdependency
OPSEC process
unclassified indicators
SYSTEM OPERATING ENVIRONMENT (Awareness Level)
Topical Content
Agency Specific Security Policies
guidance
points of contact
roles and responsibilities
NSTISS POLICIES AND PROCEDURES (Performance Level)
Topical Content
Software Security
software security mechanisms to protect information (application security
features)
software security mechanisms to protect information (concept of least
privilege)
software security mechanisms to protect information (segregation of duties)
Administrative Security Procedural Controls
construction, changing, issuing and deleting passwords
destruction of media
documentation, logs and journals
emergency destruction
external marking of media
media downgrade and declassification
preparation of security plans
reporting of computer misuse or abuse
repudiation
sanitization of media
transportation of media
Auditing and Monitoring
monitoring systems for accuracy and abnormalities
review of software design standards
verification, validation, testing, and evaluation processes
v
Fly UP